6 pages/≈1650 words
Internal Building Security Proposal (Research Proposal Sample)
Internal Building Security Proposal source..
Internal Building Security Proposal Name: Institution: Introduction Preventing unauthorized entry into industrial buildings is both a technology and design issue. Security begins with design such that staff know where their credentials could give them access to and that design is implemented by technology. Furthermore, security is designed and implemented with usability in mind (Lippert, Walby & Steckle, 2013). This way, access controls do not impede commercial activity but still provide sufficient guarantees against pervasive intrusion. Access controls are the bedrock of security systems for industrial and commercial buildings. Through these measures, enterprises can control the flow of people between different areas of the facility without compromising function, performance, and safety. Access controls determine both the choice of surveillance systems and the techniques of protecting high-value areas (Lippert, Walby & Steckle, 2013). Depending on the type of a building, security measures respond to the varied levels of acceptable risk and assessment of vulnerabilities. For instance, while commercial buildings may have lower protections around their utility systems, industrial buildings design their security systems around providing near-total guarantees on their protection from intrusion. Threats that security planners for industrial buildings face include unauthorized entry, insider threats, disruptions to operations through vandalism or other forms of sabotage, Supervisory Control and Acquisition Data (SCADA) threats, and information security threats to physical technology assets (Harris, 2005). This author intends to propose minimum security countermeasures that, when taken alone or in concert with others, can prevent the data, support systems, equipment, and supplies that ensure smooth industrial production within facilities. These measures are not entirely layered, but are intended to be responsive to a facility’s risk and vulnerability evaluations. They ensure security by deterring, preventing, detecting, stopping, and responding to intrusions and man-made disruptions. More specifically, deterrence is achieved through visible security counter-measures such as surveillance cameras, patrols, and warning signage. Prevention or delay of the intrusion is achieved through mechanisms such as access control gates and internal security personnel, while detection is achieved through video surveillance and sensors. Response to intrusions is facilitated through panic or distress alarms, dispatch systems, in integration with plant control sensors. Access Control Access control is defined as the deliberate act of guiding individuals that are entering or exiting an area through the use of landscaping, fences, lighting, and doors (Harris, 2005). Access control is an integral part of security planning, more so in industrial buildings where intrusions can lead to damage to critical infrastructure and loss of proprietary information. Considering that industrial locations have higher than average human traffic, access control systems should provide for both spatial and role-based access. For instance, raw material suppliers should not have similar access to front-office staff who, in turn, should not have unrestricted access to high-value areas within the premises. Access control measures are typically designed to protect a facility’s assets by preventing covert and forced intrusion and, once it has occurred, detecting the intrusion and providing means for action (Harris, 2005). A typical example of how this would work is as follows: an intruder prevails over an access control door, but the intrusion is detected through sensors and other security devices. An alarm to a monitoring station dispatches security guards and, possibly, law enforcement personnel to the point of physical intrusion. To prevent these situations without impairing commercial activity, it is critical that access control systems be tamper-proof yet flexible to changing security demands. Proposed access control measures: Compound and facility human access control through the use of Control perimeters such as natural (thorny) and artificial (wire) anti-climbing fences, electric fences, rated anti-ram barriers, and security guards at points of entry/exit. Thes...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Chemical Engineering: Characterization of HgS/CdS Core-Shell Nanocomposite Using Photoacoust. . .Description: Chemical Engineering Research Proposal: Characterization of HgS/CdS Core-Shell Nanocomposite Using Photoacoustic ...9 pages/≈2475 words| 10 Sources | APA | Technology | Research Proposal |
- Using Blogs in Teaching ESL/EFL WritingDescription: The purpose of this research is to investigate how tutors teaching ESL/EFL can use blogs as one of the most effective ways of improving their students’ writing skills....2 pages/≈550 words| APA | Technology | Research Proposal |
- Solr vs. Elasticsearch Search EnginesDescription: Both Solr and ElasticSearch are based on the Lucene internet searcher. Lucene is a very solid and broadly conveyed web index....2 pages/≈550 words| No Sources | APA | Technology | Research Proposal |